Software Management

Contents

1Understanding Software Management
1.1Key Software Management Concepts
1.2Software Upgrade
1.3Preparation Phase
1.4Execution Phase
1.5Fallback Operation
1.6Software Upgrade Package Life Cycle

2

Basic Software Management Procedures

3

Software Management-Related Alarms

1   Understanding Software Management

1.1   Key Software Management Concepts

Software Management provides a management interface to upgrade and delete software installed on the Managed Element (ME).

The Software Management area is represented by a group of Managed Object Classes (MOCs) under SwM within the Managed Object Model (MOM). For general information about the MOM, MOCs, cardinality, and related concepts, refer to Managed Object Model User Guide.

1.2   Software Upgrade

A software upgrade is needed in the following situations:

For more information on software domains and software items, refer to Software Inventory Management.

A patch installation and a major software upgrade are both handled as software upgrades by Software Management.

A software upgrade is achieved through the installation of an Upgrade Package (UP). An UP is a collection of Load Modules and upgrade control information delivered by the Ericsson supply organization.

Depending on its design, a software UP can upgrade one or several software domains at a time.

Software management is able to perform upgrades using the upgrade execution methods: rolling, single-step, or balanced in-service. When applied to compatibly designed software domains and UPs, the upgrade execution method affects execution and ME services downtime as shown in Table 1.

Table 1    Software Upgrade Execution Methods

Execution Method

Effect

rolling

Upgrades one software service unit or node at a time.


This method maximizes service capacity at the price of upgrade time; requires node wise compatibility.

single-step

Upgrades all nodes in one step.


This method minimizes upgrade time at the price of total service outage.

balanced in-service

Upgrades nodes in the scalable portion of the cluster one group of nodes at a time. The number of nodes per group is calculated during UP execution according to available system resources and configured parameters. Non-scalable nodes are upgraded one node at a time, as per rolling execution method.


This method aims to reach a balance between the upgrade time and the expected service capacity during the upgrade.

A software upgrade is divided into two main phases; a preparation phase and an execution phase. The preparation phase takes place during normal working hours. The execution phase takes place during "low traffic" hours.

1.3   Preparation Phase

The preparation phase has the following responsibilities:

Perform pre-upgrade actions to bring the system to the state where it can consume the UP package successfully. For this purpose, the model compiler and the merge tool inside the UP package is used.

1.4   Execution Phase

The execution phase has the following responsibilities:

The execution phase behaviors, configured during the prepare phase, are applied during activation of the UP. They are the following:

An activation step is a breakpoint. It represents a part of the upgrade after which the ME functionality can be observed manually and require user interaction. An UP with multiple steps and therefore multiple breakpoints, enables the user to verify that each step has been correctly executed.

Step-by-step activation is applicable to UPs designed with multiple steps. It allows the user to check and interact with the ME after each step.

One-step activation is applicable to UPs designed with one or multiple steps. It is, however, not recommended to apply it to an UP designed for multiple steps, since it implies reduced user interaction and increases the upgrade failure probability.

Note:  
Single-step upgrade execution method always executes as per one-step activation, even if UP contains multiple steps and step-by-step activation is configured.

The first or only activation step triggers a system backup. It is recommended to keep this default behavior.

After successfully completing activation, the ME waits for a final confirmation, that is, confirmation from the user. The user confirms that observations of the ME functions have been completed satisfactorily. After a confirm, the user can no longer cancel an upgrade.


1.5   Fallback Operation

The upgrade activation procedure stops and the ME starts a fallback operation in the following cases:

The ME raises the alarm A Fallback Operation will soon be started to indicate these conditions.

The fallback operation triggers a backup restore, which restores the ME to the state it had before the activation procedure started. It is recommended to keep this default behavior. The fallback operation is not supposed to fail under any circumstances.

1.6   Software Upgrade Package Life Cycle

During the preparation and execution phases, a software UP goes through different life cycle states.

Figure 1   Life Cycle of an Upgrade Package

Software Upgrade

Software Removal

2   Basic Software Management Procedures

Software Management is accessed using NETCONF or the Ericsson Command-Line Interface (ECLI) to manipulate the Management Information Base (MIB).

The following operations can be performed by the user and are described in Operating Instructions using the ECLI:

Software Upgrade

Software Removal

3   Software Management-Related Alarms

Table 2    Software Management-Related Alarms

Alarm

Description

A Fallback Operation will soon be started

 

Issued during a software upgrade process when waiting on action confirm or activate to prevent the upgrade from being automatically canceled.



Copyright

© Ericsson AB 2016, 2017. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.

Disclaimer

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List
All trademarks mentioned herein are the property of their respective owners. These are shown in the document Trademark Information.

    Software Management